| Home | Journals | Special Issues | Conferences | Contact us |


ANAS Volume 8, Number 17: EEICC Special 5 2014 for Computer Science and Engineering

----------------------------------------------------------------------------------------------------------------------------------

Dynamic Key Management Schemes: A Survey

Vinoth Chakkaravarthy G. and Ambiga P

1-7

----------------------------------------------------------------------------------------------------------------------------------

Query Refinement Based Question Answering System using Pattern Analysis

Muthukrishnan Ramprasath and Shanmugasundaram Hariharan

8-15

----------------------------------------------------------------------------------------------------------------------------------

A Novel Complex Event Processing Monitoring Framework using RFID

Govindasamy Vaiyapuri, Akila Govindasmay, Gilbert Gunaseelan, Kamalaganesh Thirumeni,
Hariharan. S

16-22

----------------------------------------------------------------------------------------------------------------------------------

A Survey on Cross-Layer Architecture with QoS Assurances for Wireless Multimedia
Sensor Networks

A. Sivagami, S. Malarkkan, M. Asvini Devi

23-35


----------------------------------------------------------------------------------------------------------------------------------

Cloud Computing with Optimized Resources Allocation in Virtual Machine

S. Jayanthi and Dr. P. Srinivasa Babu

36-40

----------------------------------------------------------------------------------------------------------------------------------

Hybrid Genetic Algorithm Approach for Mobile Robot Path Planning

S. Abinaya, V. Hemanth Kumar, P. Srinivasa Karthic, D. Tamilselvi, S. Mercy Shalinie

41-47

----------------------------------------------------------------------------------------------------------------------------------

Study of Honeypots: Analysis of WiFi_Honeypots and Honeypots tools

Poonkuntran.S and Arun Anoop M

48-59


----------------------------------------------------------------------------------------------------------------------------------

Detection and Mitigation System for Routing Attacks in BGP

C. Siva and Dr. S. Arumugam

60-67

----------------------------------------------------------------------------------------------------------------------------------

LH-MAC: Load Balanced Hybrid MAC protocol for Wireless Sensor Network

B. Priya and S. Solai Manohar

68-75

----------------------------------------------------------------------------------------------------------------------------------

A Recap on Data Stream Classification

S. Jayanthi and B. Karthikeyan

76-82

----------------------------------------------------------------------------------------------------------------------------------

A new Approach of data Gathering using Mobile Sink and Support-in Cluster Head in
WSN

Kumaresan, Kand Krishnan A

83-91

----------------------------------------------------------------------------------------------------------------------------------

An Empirical Study on Dos Attacks and DDoS Defense Mechanism

Dr. S. Angel Latha Mary, E. Sabaridha, A.N. Sivagami, M. Usha Rani

92-100

----------------------------------------------------------------------------------------------------------------------------------

Auditability-Aware Data Scheduling for Privacy Preserved Third-party Auditing

Suganya S., Uma.A. and Kumaresan. M.

101-107

----------------------------------------------------------------------------------------------------------------------------------

 
 
© 2007, AENSI Publications